139.8 KB | 3 files | DOC, PDF
Use this template to establish a control mechanism for official use of IM, create guidelines for employee use and describe expectations for business unit oversight of IM usage, among other things.
There are many security threats associated with instant messaging (IM) in the enterprise that increase a company's vulnerability. Use this template to establish a policy that will:
Rein in IM security risks in by downloading and tailoring this IM security policy.
The attached Zip file includes:
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices. ... More >>
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ... More >>
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. ... More >>